Update sepolicy/pawlet_device.te
This commit is contained in:
@@ -5,17 +5,14 @@ type pawlet_device_exec, exec_type, file_type, system_file_type;
|
|||||||
# Inherit from core domain
|
# Inherit from core domain
|
||||||
typeattribute pawlet_device coredomain;
|
typeattribute pawlet_device coredomain;
|
||||||
|
|
||||||
# Property access - use proper macros ONLY
|
# Property access - use proper macros ONLY (no direct allow rules)
|
||||||
get_prop(pawlet_device, vendor_default_prop)
|
get_prop(pawlet_device, vendor_default_prop)
|
||||||
set_prop(pawlet_device, vendor_default_prop)
|
set_prop(pawlet_device, vendor_default_prop)
|
||||||
|
|
||||||
# Framework interactions - use proper macros
|
# Binder communication if needed
|
||||||
# REMOVE direct service_manager access
|
|
||||||
# allow pawlet_device system_server:service_manager find;
|
|
||||||
|
|
||||||
# REMOVE all direct file access to properties
|
|
||||||
# allow pawlet_device vendor_default_prop:file { getattr open read map };
|
|
||||||
|
|
||||||
# If you need to interact with system services, use proper domains:
|
|
||||||
allow pawlet_device system_server:binder { call transfer };
|
allow pawlet_device system_server:binder { call transfer };
|
||||||
allow pawlet_device servicemanager:binder { call transfer };
|
allow pawlet_device servicemanager:binder { call transfer };
|
||||||
|
|
||||||
|
# Basic file access for your domain (only for your own files)
|
||||||
|
allow pawlet_device pawlet_device_exec:file { execute read open map };
|
||||||
|
allow pawlet_device system_file:file { read getattr open };
|
Reference in New Issue
Block a user